Sciweavers

844 search results - page 34 / 169
» Solving the p
Sort
View
ESA
2006
Springer
102views Algorithms» more  ESA 2006»
15 years 1 months ago
Necklaces, Convolutions, and X + Y
We give subquadratic algorithms that, given two necklaces each with n beads at arbitrary positions, compute the optimal rotation of the necklaces to best align the beads. Here ali...
David Bremner, Timothy M. Chan, Erik D. Demaine, J...
ICCAD
2009
IEEE
154views Hardware» more  ICCAD 2009»
14 years 7 months ago
Pad assignment for die-stacking System-in-Package design
Wire bonding is the most popular method to connect signals between dies in System-in-Package (SiP) design nowadays. Pad assignment, which assigns inter-die signals to die pads so ...
Yu-Chen Lin, Wai-Kei Mak, Chris Chu, Ting-Chi Wang
P2P
2008
IEEE
15 years 4 months ago
Transaction Rate Limiters for Peer-to-Peer Systems
We introduce transaction rate limiters, new mechanisms that limit (probabilistically) the maximum number of transactions a user of a peer-to-peer system can do in any given period...
Marcos Kawazoe Aguilera, Mark Lillibridge, Xiaozho...
FIMI
2004
239views Data Mining» more  FIMI 2004»
14 years 11 months ago
LCM ver. 2: Efficient Mining Algorithms for Frequent/Closed/Maximal Itemsets
: For a transaction database, a frequent itemset is an itemset included in at least a specified number of transactions. A frequent itemset P is maximal if P is included in no other...
Takeaki Uno, Masashi Kiyomi, Hiroki Arimura
89
Voted
IJCAI
2003
14 years 11 months ago
Learning to Classify Texts Using Positive and Unlabeled Data
In traditional text classification, a classifier is built using labeled training documents of every class. This paper studies a different problem. Given a set P of documents of a ...
Xiaoli Li, Bing Liu